StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Public Key Infrastructure - Research Paper Example

Cite this document
Summary
The management is convinced to implement Public Key Infrastructure (PKI) as a framework to ensure integrity, confidentiality,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Public Key Infrastructure
Read Text Preview

Extract of sample "Public Key Infrastructure"

Public Key Infrastructure Case Overview The organization is presently using a Microsoft Server Active Directory domain which is administered bya team of information security. The management is convinced to implement Public Key Infrastructure (PKI) as a framework to ensure integrity, confidentiality, nonrepudiation and authentication in their operation. Subsequently, the company would be using digital certificate to sign software to demonstrate authenticity of software to their clients. With this regard the study focuses on analyzing the fundamentals of PKI and their application in order to ensure quality resources within the organization.

DiscussionPKI is set of complex set of application that supports other application system and components that will assist in building a network security. Implementation of PKI is anticipated to serve as an essential component of an overall security system within the organization (Zao, 2012; Hanka et al., 2011). PKI is highly scalable and helps the in maintaining certificates with their unique identity. A feature of PKI such as scalability further creates no requirement of third party authentication.

Through the feature of the delegation of trust the software enhances the authentication of the software within the end users. To enhance the security system within an organization the PKI provides unique codes and ensures that only legitimate users are able to access to the system resources. These features of PKI along with identity based self-certified keys are anticipated to ensure better security system controlled within the organization (The Saylor Foundation, 2012). PKI system allows the use of mathematically related key pairs, to be used for public and private level.

The private key is used to safeguard the requirement of the privacy at the organizational level. Correspondingly, the public keys provide a unique identification to the users of the software. This method of encryption and decryption is further observed to help the organization to authenticate the software and enhances the credibility to the customers (United States Department of Agriculture, n.d.). The certificate authority helps in creating and binding the public encryption keys. The in-house certification authority enhances the maximum level of control over the different software being used within an organization.

The process employs a digital sign which enhances the financial soundness, liability protection as well as enhances the corroboration of transaction. The document that is signed by a trusted b y a third party organization is referred to as a public Certificate Authority (CA). The in-house CA has been the most trusted type of the security system but are also very costly at the same time. The public CA is based on the policy module depended on the predefined list of certificate extensions. However, by sharing of the certificate encryption among the public CAs increases its vulnerability and enhances the chances of being hacked.

On the other hand the public CA enhances the security of the public websites and in turn enhances the transparency of the data reducing their vulnerability. This helps the organization to increase their security system and also ensures their development of the certificate authority by reducing vulnerabilities related to security aspect (Preneel, 2011). Based on the above stated factors, it is proposed to the organization to use public CA as it is less costly while it is also effective enough to guarantee adequate security (Hanka et al., 2011). ConclusionThe organization should be implementing the PKI in order to reduce the any possible security threats within the organization.

Moreover by implementing the PKI, the organization will be able to increase their integrity and credibility that would facilitate it to acquire the greater confidence of the end users. By issuing the digital certificates the company will be able to ensure their authentication and non-repudiation at a larger extent.ReferencesHanka, O., Eichhorn, M., Pfannenstein, M., Eberspacher, J. & Steinbach, E. (2011). A distributed public key infrastructure based on threshold cryptography for the Hiimap next generation internet architecture.

Future Internet, 3, 1-5.Preneel, B. (2011). Public key infrastructure fundamentals. Katholieke Universiteit Leuven, 1-30.The Saylor Foundation. (2012). Public key infrastructure. Retrieved from http://www.saylor.org/site/wp-content/uploads/2012/07/Public-key-infrastructure1.pdfUnited States Department of Agriculture. (2013). Use of public key infrastructure (PKI). Retrieved from http://www.ocio.usda.gov/sites/default/files/docs/2012/DM3530-003.htm Zao, J. K. (2012). Public key infrastructure (PKI).

Computer Science Department, 1-17.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1654310-public-key-infrastructure
(Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 Words)
Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1654310-public-key-infrastructure.
“Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1654310-public-key-infrastructure.
  • Cited: 0 times

CHECK THESE SAMPLES OF Public Key Infrastructure

Solving Problems of Multiple Identities

This paper ''Computer Security'' tells that Solving problems of multiple identities is done under effective identity management.... Problems of multiple identities within the Metropolitan Police Service can only be solved through an effective identity management system that utilizes various technologies....
8 Pages (2000 words) Essay

Rationale behind Increasing Computer Crime

Public Key Infrastructure (PKI) and digital certificates supplements the encrypted algorithm to encounter the challenges of illegal activity and augment the business operations to target potential customer.... The extreme dependency on electronic system, increasing complexity of IT system to support the business operations of e-commerce and the cost of digital signature and assets has make the internet system complex as medium of online shopping....
1 Pages (250 words) Essay

Computing security exam question

Public Key Infrastructure (PKI) refers to an array of electronic devices, applications, guidelines, and methods that play a crucial role in the organization and management of digital certificates.... This paper will seek to assess and analyze the effectiveness of Public Key Infrastructure (PKI).... Public Key Infrastructure (PKI) is a schema that provides high level of security and confidentiality for Internet users that seek to engage in online transactions and e-commerce....
4 Pages (1000 words) Essay

Business - building trust in the e-business

Public Key Infrastructure (PKI): with PKI security architecture which will provide secures exchange of information on internet.... Network security, Electronic commerce, Public Key Infrastructure, p.... Address and information about office: the customer gains a trust when he comes to know that a company has an infrastructure.... Address and information about office: the customer gains a trust when he comes to know that a company has an infrastructure....
2 Pages (500 words) Essay

Vulnerabilities

Accordingly, during… Similarly, non-repudiation issues will also occur, if there is no Public Key Infrastructure (PKI) that is operated by separate third parties.... Similarly, non-repudiation issues will also occur, if there is no Public Key Infrastructure (PKI) that is operated by separate third parties.... However, if encryption is applied to the Public Key Infrastructure, there is a requirement of identifying people possessing the relevant key to decrypt the message (Ellison & Schneier, 2000)....
2 Pages (500 words) Research Paper

Wireless Home Networking Simplified

SSH, an abbreviation of Secure Shell is a cryptographic network protocol that allows users between two different computers a number of secure advantages among them secure data communication, remote command-line login, remote command execution, as well as other secure network… SSH uses a secure channel to connect through an insecure network (Peterson and Bruce 880). Public Key Infrastructure allows users of an unsecure public network, particularly the internet to have more secure communication and privately exchange data, as well as money SSH SSH, an abbreviation of Secure Shell is a cryptographic network protocol that allows users between two different computers a number of secure advantages among them secure data communication, remote command-line login, remote command execution, as well as other secure network services....
1 Pages (250 words) Assignment

Securing Data Using IPSec VPN

While analyzing the security issues around VPN, Zhu and Ma (2004) stated that Public Key Infrastructure (PKI) can be especially helpful along with dedicated network level key exchange protocols to enhance data protection.... a VPN is capable of operating as a secure and cost-effective network even inside the framework of a public network infrastructure (Bentley Walker 2012).... However, according to Fereidooni, Taheri, and Mahramian (2012:228): “In essence, a VPN provides a secured tunnel between two end points across a public network....
4 Pages (1000 words) Research Proposal

IPSec and Cryptography

The paper "IPSec and Cryptography" offers a clear discussion of the major functions of IPsec in relation to the cryptographic functions employed by the protocol suite during the packet exchange process.... The paper further discusses the limitations of the IPsec in relation to the used algorithms and attacks against IPsec....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us